addrlabel.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * IPv6 Address Label subsystem
  4. * for the IPv6 "Default" Source Address Selection
  5. *
  6. * Copyright (C)2007 USAGI/WIDE Project
  7. */
  8. /*
  9. * Author:
  10. * YOSHIFUJI Hideaki @ USAGI/WIDE Project <yoshfuji@linux-ipv6.org>
  11. */
  12. #include <linux/kernel.h>
  13. #include <linux/list.h>
  14. #include <linux/rcupdate.h>
  15. #include <linux/in6.h>
  16. #include <linux/slab.h>
  17. #include <net/addrconf.h>
  18. #include <linux/if_addrlabel.h>
  19. #include <linux/netlink.h>
  20. #include <linux/rtnetlink.h>
  21. #include <linux/refcount.h>
  22. #if 0
  23. #define ADDRLABEL(x...) printk(x)
  24. #else
  25. #define ADDRLABEL(x...) do { ; } while (0)
  26. #endif
  27. /*
  28. * Policy Table
  29. */
  30. struct ip6addrlbl_entry {
  31. possible_net_t lbl_net;
  32. struct in6_addr prefix;
  33. int prefixlen;
  34. int ifindex;
  35. int addrtype;
  36. u32 label;
  37. struct hlist_node list;
  38. refcount_t refcnt;
  39. struct rcu_head rcu;
  40. };
  41. static struct ip6addrlbl_table
  42. {
  43. struct hlist_head head;
  44. spinlock_t lock;
  45. u32 seq;
  46. } ip6addrlbl_table;
  47. static inline
  48. struct net *ip6addrlbl_net(const struct ip6addrlbl_entry *lbl)
  49. {
  50. return read_pnet(&lbl->lbl_net);
  51. }
  52. /*
  53. * Default policy table (RFC6724 + extensions)
  54. *
  55. * prefix addr_type label
  56. * -------------------------------------------------------------------------
  57. * ::1/128 LOOPBACK 0
  58. * ::/0 N/A 1
  59. * 2002::/16 N/A 2
  60. * ::/96 COMPATv4 3
  61. * ::ffff:0:0/96 V4MAPPED 4
  62. * fc00::/7 N/A 5 ULA (RFC 4193)
  63. * 2001::/32 N/A 6 Teredo (RFC 4380)
  64. * 2001:10::/28 N/A 7 ORCHID (RFC 4843)
  65. * fec0::/10 N/A 11 Site-local
  66. * (deprecated by RFC3879)
  67. * 3ffe::/16 N/A 12 6bone
  68. *
  69. * Note: 0xffffffff is used if we do not have any policies.
  70. * Note: Labels for ULA and 6to4 are different from labels listed in RFC6724.
  71. */
  72. #define IPV6_ADDR_LABEL_DEFAULT 0xffffffffUL
  73. static const __net_initconst struct ip6addrlbl_init_table
  74. {
  75. const struct in6_addr *prefix;
  76. int prefixlen;
  77. u32 label;
  78. } ip6addrlbl_init_table[] = {
  79. { /* ::/0 */
  80. .prefix = &in6addr_any,
  81. .label = 1,
  82. }, { /* fc00::/7 */
  83. .prefix = &(struct in6_addr){ { { 0xfc } } } ,
  84. .prefixlen = 7,
  85. .label = 5,
  86. }, { /* fec0::/10 */
  87. .prefix = &(struct in6_addr){ { { 0xfe, 0xc0 } } },
  88. .prefixlen = 10,
  89. .label = 11,
  90. }, { /* 2002::/16 */
  91. .prefix = &(struct in6_addr){ { { 0x20, 0x02 } } },
  92. .prefixlen = 16,
  93. .label = 2,
  94. }, { /* 3ffe::/16 */
  95. .prefix = &(struct in6_addr){ { { 0x3f, 0xfe } } },
  96. .prefixlen = 16,
  97. .label = 12,
  98. }, { /* 2001::/32 */
  99. .prefix = &(struct in6_addr){ { { 0x20, 0x01 } } },
  100. .prefixlen = 32,
  101. .label = 6,
  102. }, { /* 2001:10::/28 */
  103. .prefix = &(struct in6_addr){ { { 0x20, 0x01, 0x00, 0x10 } } },
  104. .prefixlen = 28,
  105. .label = 7,
  106. }, { /* ::ffff:0:0 */
  107. .prefix = &(struct in6_addr){ { { [10] = 0xff, [11] = 0xff } } },
  108. .prefixlen = 96,
  109. .label = 4,
  110. }, { /* ::/96 */
  111. .prefix = &in6addr_any,
  112. .prefixlen = 96,
  113. .label = 3,
  114. }, { /* ::1/128 */
  115. .prefix = &in6addr_loopback,
  116. .prefixlen = 128,
  117. .label = 0,
  118. }
  119. };
  120. /* Object management */
  121. static inline void ip6addrlbl_free(struct ip6addrlbl_entry *p)
  122. {
  123. kfree(p);
  124. }
  125. static void ip6addrlbl_free_rcu(struct rcu_head *h)
  126. {
  127. ip6addrlbl_free(container_of(h, struct ip6addrlbl_entry, rcu));
  128. }
  129. static bool ip6addrlbl_hold(struct ip6addrlbl_entry *p)
  130. {
  131. return refcount_inc_not_zero(&p->refcnt);
  132. }
  133. static inline void ip6addrlbl_put(struct ip6addrlbl_entry *p)
  134. {
  135. if (refcount_dec_and_test(&p->refcnt))
  136. call_rcu(&p->rcu, ip6addrlbl_free_rcu);
  137. }
  138. /* Find label */
  139. static bool __ip6addrlbl_match(struct net *net,
  140. const struct ip6addrlbl_entry *p,
  141. const struct in6_addr *addr,
  142. int addrtype, int ifindex)
  143. {
  144. if (!net_eq(ip6addrlbl_net(p), net))
  145. return false;
  146. if (p->ifindex && p->ifindex != ifindex)
  147. return false;
  148. if (p->addrtype && p->addrtype != addrtype)
  149. return false;
  150. if (!ipv6_prefix_equal(addr, &p->prefix, p->prefixlen))
  151. return false;
  152. return true;
  153. }
  154. static struct ip6addrlbl_entry *__ipv6_addr_label(struct net *net,
  155. const struct in6_addr *addr,
  156. int type, int ifindex)
  157. {
  158. struct ip6addrlbl_entry *p;
  159. hlist_for_each_entry_rcu(p, &ip6addrlbl_table.head, list) {
  160. if (__ip6addrlbl_match(net, p, addr, type, ifindex))
  161. return p;
  162. }
  163. return NULL;
  164. }
  165. u32 ipv6_addr_label(struct net *net,
  166. const struct in6_addr *addr, int type, int ifindex)
  167. {
  168. u32 label;
  169. struct ip6addrlbl_entry *p;
  170. type &= IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK;
  171. rcu_read_lock();
  172. p = __ipv6_addr_label(net, addr, type, ifindex);
  173. label = p ? p->label : IPV6_ADDR_LABEL_DEFAULT;
  174. rcu_read_unlock();
  175. ADDRLABEL(KERN_DEBUG "%s(addr=%pI6, type=%d, ifindex=%d) => %08x\n",
  176. __func__, addr, type, ifindex, label);
  177. return label;
  178. }
  179. /* allocate one entry */
  180. static struct ip6addrlbl_entry *ip6addrlbl_alloc(struct net *net,
  181. const struct in6_addr *prefix,
  182. int prefixlen, int ifindex,
  183. u32 label)
  184. {
  185. struct ip6addrlbl_entry *newp;
  186. int addrtype;
  187. ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u)\n",
  188. __func__, prefix, prefixlen, ifindex, (unsigned int)label);
  189. addrtype = ipv6_addr_type(prefix) & (IPV6_ADDR_MAPPED | IPV6_ADDR_COMPATv4 | IPV6_ADDR_LOOPBACK);
  190. switch (addrtype) {
  191. case IPV6_ADDR_MAPPED:
  192. if (prefixlen > 96)
  193. return ERR_PTR(-EINVAL);
  194. if (prefixlen < 96)
  195. addrtype = 0;
  196. break;
  197. case IPV6_ADDR_COMPATv4:
  198. if (prefixlen != 96)
  199. addrtype = 0;
  200. break;
  201. case IPV6_ADDR_LOOPBACK:
  202. if (prefixlen != 128)
  203. addrtype = 0;
  204. break;
  205. }
  206. newp = kmalloc(sizeof(*newp), GFP_KERNEL);
  207. if (!newp)
  208. return ERR_PTR(-ENOMEM);
  209. ipv6_addr_prefix(&newp->prefix, prefix, prefixlen);
  210. newp->prefixlen = prefixlen;
  211. newp->ifindex = ifindex;
  212. newp->addrtype = addrtype;
  213. newp->label = label;
  214. INIT_HLIST_NODE(&newp->list);
  215. write_pnet(&newp->lbl_net, net);
  216. refcount_set(&newp->refcnt, 1);
  217. return newp;
  218. }
  219. /* add a label */
  220. static int __ip6addrlbl_add(struct ip6addrlbl_entry *newp, int replace)
  221. {
  222. struct hlist_node *n;
  223. struct ip6addrlbl_entry *last = NULL, *p = NULL;
  224. int ret = 0;
  225. ADDRLABEL(KERN_DEBUG "%s(newp=%p, replace=%d)\n", __func__, newp,
  226. replace);
  227. hlist_for_each_entry_safe(p, n, &ip6addrlbl_table.head, list) {
  228. if (p->prefixlen == newp->prefixlen &&
  229. net_eq(ip6addrlbl_net(p), ip6addrlbl_net(newp)) &&
  230. p->ifindex == newp->ifindex &&
  231. ipv6_addr_equal(&p->prefix, &newp->prefix)) {
  232. if (!replace) {
  233. ret = -EEXIST;
  234. goto out;
  235. }
  236. hlist_replace_rcu(&p->list, &newp->list);
  237. ip6addrlbl_put(p);
  238. goto out;
  239. } else if ((p->prefixlen == newp->prefixlen && !p->ifindex) ||
  240. (p->prefixlen < newp->prefixlen)) {
  241. hlist_add_before_rcu(&newp->list, &p->list);
  242. goto out;
  243. }
  244. last = p;
  245. }
  246. if (last)
  247. hlist_add_behind_rcu(&newp->list, &last->list);
  248. else
  249. hlist_add_head_rcu(&newp->list, &ip6addrlbl_table.head);
  250. out:
  251. if (!ret)
  252. ip6addrlbl_table.seq++;
  253. return ret;
  254. }
  255. /* add a label */
  256. static int ip6addrlbl_add(struct net *net,
  257. const struct in6_addr *prefix, int prefixlen,
  258. int ifindex, u32 label, int replace)
  259. {
  260. struct ip6addrlbl_entry *newp;
  261. int ret = 0;
  262. ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d, label=%u, replace=%d)\n",
  263. __func__, prefix, prefixlen, ifindex, (unsigned int)label,
  264. replace);
  265. newp = ip6addrlbl_alloc(net, prefix, prefixlen, ifindex, label);
  266. if (IS_ERR(newp))
  267. return PTR_ERR(newp);
  268. spin_lock(&ip6addrlbl_table.lock);
  269. ret = __ip6addrlbl_add(newp, replace);
  270. spin_unlock(&ip6addrlbl_table.lock);
  271. if (ret)
  272. ip6addrlbl_free(newp);
  273. return ret;
  274. }
  275. /* remove a label */
  276. static int __ip6addrlbl_del(struct net *net,
  277. const struct in6_addr *prefix, int prefixlen,
  278. int ifindex)
  279. {
  280. struct ip6addrlbl_entry *p = NULL;
  281. struct hlist_node *n;
  282. int ret = -ESRCH;
  283. ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n",
  284. __func__, prefix, prefixlen, ifindex);
  285. hlist_for_each_entry_safe(p, n, &ip6addrlbl_table.head, list) {
  286. if (p->prefixlen == prefixlen &&
  287. net_eq(ip6addrlbl_net(p), net) &&
  288. p->ifindex == ifindex &&
  289. ipv6_addr_equal(&p->prefix, prefix)) {
  290. hlist_del_rcu(&p->list);
  291. ip6addrlbl_put(p);
  292. ret = 0;
  293. break;
  294. }
  295. }
  296. return ret;
  297. }
  298. static int ip6addrlbl_del(struct net *net,
  299. const struct in6_addr *prefix, int prefixlen,
  300. int ifindex)
  301. {
  302. struct in6_addr prefix_buf;
  303. int ret;
  304. ADDRLABEL(KERN_DEBUG "%s(prefix=%pI6, prefixlen=%d, ifindex=%d)\n",
  305. __func__, prefix, prefixlen, ifindex);
  306. ipv6_addr_prefix(&prefix_buf, prefix, prefixlen);
  307. spin_lock(&ip6addrlbl_table.lock);
  308. ret = __ip6addrlbl_del(net, &prefix_buf, prefixlen, ifindex);
  309. spin_unlock(&ip6addrlbl_table.lock);
  310. return ret;
  311. }
  312. /* add default label */
  313. static int __net_init ip6addrlbl_net_init(struct net *net)
  314. {
  315. int err = 0;
  316. int i;
  317. ADDRLABEL(KERN_DEBUG "%s\n", __func__);
  318. for (i = 0; i < ARRAY_SIZE(ip6addrlbl_init_table); i++) {
  319. int ret = ip6addrlbl_add(net,
  320. ip6addrlbl_init_table[i].prefix,
  321. ip6addrlbl_init_table[i].prefixlen,
  322. 0,
  323. ip6addrlbl_init_table[i].label, 0);
  324. /* XXX: should we free all rules when we catch an error? */
  325. if (ret && (!err || err != -ENOMEM))
  326. err = ret;
  327. }
  328. return err;
  329. }
  330. static void __net_exit ip6addrlbl_net_exit(struct net *net)
  331. {
  332. struct ip6addrlbl_entry *p = NULL;
  333. struct hlist_node *n;
  334. /* Remove all labels belonging to the exiting net */
  335. spin_lock(&ip6addrlbl_table.lock);
  336. hlist_for_each_entry_safe(p, n, &ip6addrlbl_table.head, list) {
  337. if (net_eq(ip6addrlbl_net(p), net)) {
  338. hlist_del_rcu(&p->list);
  339. ip6addrlbl_put(p);
  340. }
  341. }
  342. spin_unlock(&ip6addrlbl_table.lock);
  343. }
  344. static struct pernet_operations ipv6_addr_label_ops = {
  345. .init = ip6addrlbl_net_init,
  346. .exit = ip6addrlbl_net_exit,
  347. };
  348. int __init ipv6_addr_label_init(void)
  349. {
  350. spin_lock_init(&ip6addrlbl_table.lock);
  351. return register_pernet_subsys(&ipv6_addr_label_ops);
  352. }
  353. void ipv6_addr_label_cleanup(void)
  354. {
  355. unregister_pernet_subsys(&ipv6_addr_label_ops);
  356. }
  357. static const struct nla_policy ifal_policy[IFAL_MAX+1] = {
  358. [IFAL_ADDRESS] = { .len = sizeof(struct in6_addr), },
  359. [IFAL_LABEL] = { .len = sizeof(u32), },
  360. };
  361. static bool addrlbl_ifindex_exists(struct net *net, int ifindex)
  362. {
  363. struct net_device *dev;
  364. rcu_read_lock();
  365. dev = dev_get_by_index_rcu(net, ifindex);
  366. rcu_read_unlock();
  367. return dev != NULL;
  368. }
  369. static int ip6addrlbl_newdel(struct sk_buff *skb, struct nlmsghdr *nlh,
  370. struct netlink_ext_ack *extack)
  371. {
  372. struct net *net = sock_net(skb->sk);
  373. struct ifaddrlblmsg *ifal;
  374. struct nlattr *tb[IFAL_MAX+1];
  375. struct in6_addr *pfx;
  376. u32 label;
  377. int err = 0;
  378. err = nlmsg_parse(nlh, sizeof(*ifal), tb, IFAL_MAX, ifal_policy,
  379. extack);
  380. if (err < 0)
  381. return err;
  382. ifal = nlmsg_data(nlh);
  383. if (ifal->ifal_family != AF_INET6 ||
  384. ifal->ifal_prefixlen > 128)
  385. return -EINVAL;
  386. if (!tb[IFAL_ADDRESS])
  387. return -EINVAL;
  388. pfx = nla_data(tb[IFAL_ADDRESS]);
  389. if (!tb[IFAL_LABEL])
  390. return -EINVAL;
  391. label = nla_get_u32(tb[IFAL_LABEL]);
  392. if (label == IPV6_ADDR_LABEL_DEFAULT)
  393. return -EINVAL;
  394. switch (nlh->nlmsg_type) {
  395. case RTM_NEWADDRLABEL:
  396. if (ifal->ifal_index &&
  397. !addrlbl_ifindex_exists(net, ifal->ifal_index))
  398. return -EINVAL;
  399. err = ip6addrlbl_add(net, pfx, ifal->ifal_prefixlen,
  400. ifal->ifal_index, label,
  401. nlh->nlmsg_flags & NLM_F_REPLACE);
  402. break;
  403. case RTM_DELADDRLABEL:
  404. err = ip6addrlbl_del(net, pfx, ifal->ifal_prefixlen,
  405. ifal->ifal_index);
  406. break;
  407. default:
  408. err = -EOPNOTSUPP;
  409. }
  410. return err;
  411. }
  412. static void ip6addrlbl_putmsg(struct nlmsghdr *nlh,
  413. int prefixlen, int ifindex, u32 lseq)
  414. {
  415. struct ifaddrlblmsg *ifal = nlmsg_data(nlh);
  416. ifal->ifal_family = AF_INET6;
  417. ifal->ifal_prefixlen = prefixlen;
  418. ifal->ifal_flags = 0;
  419. ifal->ifal_index = ifindex;
  420. ifal->ifal_seq = lseq;
  421. };
  422. static int ip6addrlbl_fill(struct sk_buff *skb,
  423. struct ip6addrlbl_entry *p,
  424. u32 lseq,
  425. u32 portid, u32 seq, int event,
  426. unsigned int flags)
  427. {
  428. struct nlmsghdr *nlh = nlmsg_put(skb, portid, seq, event,
  429. sizeof(struct ifaddrlblmsg), flags);
  430. if (!nlh)
  431. return -EMSGSIZE;
  432. ip6addrlbl_putmsg(nlh, p->prefixlen, p->ifindex, lseq);
  433. if (nla_put_in6_addr(skb, IFAL_ADDRESS, &p->prefix) < 0 ||
  434. nla_put_u32(skb, IFAL_LABEL, p->label) < 0) {
  435. nlmsg_cancel(skb, nlh);
  436. return -EMSGSIZE;
  437. }
  438. nlmsg_end(skb, nlh);
  439. return 0;
  440. }
  441. static int ip6addrlbl_dump(struct sk_buff *skb, struct netlink_callback *cb)
  442. {
  443. struct net *net = sock_net(skb->sk);
  444. struct ip6addrlbl_entry *p;
  445. int idx = 0, s_idx = cb->args[0];
  446. int err;
  447. rcu_read_lock();
  448. hlist_for_each_entry_rcu(p, &ip6addrlbl_table.head, list) {
  449. if (idx >= s_idx &&
  450. net_eq(ip6addrlbl_net(p), net)) {
  451. err = ip6addrlbl_fill(skb, p,
  452. ip6addrlbl_table.seq,
  453. NETLINK_CB(cb->skb).portid,
  454. cb->nlh->nlmsg_seq,
  455. RTM_NEWADDRLABEL,
  456. NLM_F_MULTI);
  457. if (err < 0)
  458. break;
  459. }
  460. idx++;
  461. }
  462. rcu_read_unlock();
  463. cb->args[0] = idx;
  464. return skb->len;
  465. }
  466. static inline int ip6addrlbl_msgsize(void)
  467. {
  468. return NLMSG_ALIGN(sizeof(struct ifaddrlblmsg))
  469. + nla_total_size(16) /* IFAL_ADDRESS */
  470. + nla_total_size(4); /* IFAL_LABEL */
  471. }
  472. static int ip6addrlbl_get(struct sk_buff *in_skb, struct nlmsghdr *nlh,
  473. struct netlink_ext_ack *extack)
  474. {
  475. struct net *net = sock_net(in_skb->sk);
  476. struct ifaddrlblmsg *ifal;
  477. struct nlattr *tb[IFAL_MAX+1];
  478. struct in6_addr *addr;
  479. u32 lseq;
  480. int err = 0;
  481. struct ip6addrlbl_entry *p;
  482. struct sk_buff *skb;
  483. err = nlmsg_parse(nlh, sizeof(*ifal), tb, IFAL_MAX, ifal_policy,
  484. extack);
  485. if (err < 0)
  486. return err;
  487. ifal = nlmsg_data(nlh);
  488. if (ifal->ifal_family != AF_INET6 ||
  489. ifal->ifal_prefixlen != 128)
  490. return -EINVAL;
  491. if (ifal->ifal_index &&
  492. !addrlbl_ifindex_exists(net, ifal->ifal_index))
  493. return -EINVAL;
  494. if (!tb[IFAL_ADDRESS])
  495. return -EINVAL;
  496. addr = nla_data(tb[IFAL_ADDRESS]);
  497. rcu_read_lock();
  498. p = __ipv6_addr_label(net, addr, ipv6_addr_type(addr), ifal->ifal_index);
  499. if (p && !ip6addrlbl_hold(p))
  500. p = NULL;
  501. lseq = ip6addrlbl_table.seq;
  502. rcu_read_unlock();
  503. if (!p) {
  504. err = -ESRCH;
  505. goto out;
  506. }
  507. skb = nlmsg_new(ip6addrlbl_msgsize(), GFP_KERNEL);
  508. if (!skb) {
  509. ip6addrlbl_put(p);
  510. return -ENOBUFS;
  511. }
  512. err = ip6addrlbl_fill(skb, p, lseq,
  513. NETLINK_CB(in_skb).portid, nlh->nlmsg_seq,
  514. RTM_NEWADDRLABEL, 0);
  515. ip6addrlbl_put(p);
  516. if (err < 0) {
  517. WARN_ON(err == -EMSGSIZE);
  518. kfree_skb(skb);
  519. goto out;
  520. }
  521. err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
  522. out:
  523. return err;
  524. }
  525. void __init ipv6_addr_label_rtnl_register(void)
  526. {
  527. __rtnl_register(PF_INET6, RTM_NEWADDRLABEL, ip6addrlbl_newdel,
  528. NULL, RTNL_FLAG_DOIT_UNLOCKED);
  529. __rtnl_register(PF_INET6, RTM_DELADDRLABEL, ip6addrlbl_newdel,
  530. NULL, RTNL_FLAG_DOIT_UNLOCKED);
  531. __rtnl_register(PF_INET6, RTM_GETADDRLABEL, ip6addrlbl_get,
  532. ip6addrlbl_dump, RTNL_FLAG_DOIT_UNLOCKED);
  533. }